In 2020, most new cyber attacks will come through encrypted traffic.
Currently companies, incl. midsize companies have perimeter-based security appliances. But with data and applications moving into the cloud, and the majority of employees in the network accessing corporate data and applications remotely, the ...

Join us for a discussion about how cloud deployment planners need to be ever-vigilant for all types of cybersecurity attack vectors. COVID-19 has rapidly transformed how we all work. Organizations need quick and effective user security to address the changing needs of the new normal. The threat environment is ...

The problem when upskilling the good guys has always been this: how do we keep them at the cutting edge of cybersecurity while staying legal? We want defenders to innovate as rapidly as the criminals.
Register for this upcoming live webinar and learn:
How human readiness can be mapped to the risks that ...

Recent events have brought to light the importance of medical device security. From vulnerabilities to mounting cyberattacks to the onset of COVID-19, patient care involves more connected devices across every healthcare organization.
Join Abhishek Agarwal, the CISO from Fresenius Medical Care, the world's leading ...

"Digital transformation" was an overused marketing buzz phrase until the global crisis came along and - over the course of a single weekend - changed permanently how we live and work.
Enterprises are emerging from firefighting mode now and beginning to strategize about what comes next. What will be the balance of ...

With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures.
The new remote work and remote learner environments provide ...

Organizations have undergone rapid network transformation in the last two months, and though the change has now stabilized into a new normal, new security concerns that affect an organization's overall risk often have not been addressed. Now that the dust has settled, many leaders are examining the transformation and ...

Every team building a mobile or app has a choice to make: build the whole app from scratch or find and use a pre-built option to A third-party customer identity and access management (CIAM) solution is another such service. A digital identity layer comprised of APIs, SDKs, and out-of-the-box customizable components ...

At the heart of digital transformation initiatives are the adoption of API-first strategies.
Register for this live webinar to learn how your organization can develop a comprehensive security and governance strategy to protect API transformation projects. Gain insights on how to:
Extend existing security ...

Within weeks of the California Consumer Privacy Act of 2018 going into effect, the first CCPA lawsuit was filed in U.S. District Court in Northern California, based on a personal data breach of a retailer and its cloud service provider. Since then, many lawsuits have been filed, addressing multiple aspects of ...

The concept of "identity is the perimeter" is not new. However, COVID-19 has accelerated the transformation of workforce identity management, forcing organizations to navigate a new reality sooner than expected.
Whether or not they were prepared for it, more organizations are working remotely and utilizing SaaS ...

Creating a cybersecurity incident response plan is a fundamental requirement of any cybersecurity program - and a requirement of many global regulations, including GDPR and PCI DSS. During this workshop, Troutman Sanders' Sadia Mirza will discuss the benefits of table top exercises. She then will be joined by law ...

Your employees are working from home to stay safe during these unsettling times, but are you prepared to keep your organization secure and your employees productive?
View this webinar OnDemand and learn:
How to quickly enable all employees across the globe to work from home while keeping your organization ...

What if you could not only identify your organization's current security gaps but ALSO understand and communicate the financial risk of potential cyberattacks and the financial gains of proposed security measures?
The answer is clear: you would be able to make decisions that optimize both your company's security and ...

It is a lot for IT teams to handle a remote workforce. Keeping up with security issues, maintaining data compliance, and minimizing data loss are some of the challenges IT teams are facing today.
In this webinar, we will cover how IT and security teams can empower end-users working remotely by increasing their ...

Subscribe

Please fill out the following fields (All fields required):

Subscription Preferences:

Healthcare

Risk Management

Data Breach

Careers

Rob Krug

Sr Security Architect

Rob Krug has been in the network engineering and security space for 30 years and is currently a Senior Security Architect for Avast. His background includes extensive work with telecommunications, network design and management, and most importantly network security. Specializing in security vulnerabilities his background includes extensive training and experience in cryptography, ethical hacking, and reverse engineering of malware.

Mark McIntyre

Chief Security Advisor, Microsoft

Mark McIntyre is a Chief Security Advisor in Microsoft's Cybersecurity Solutions Group. Mark works with the US government, NATO, allied governments, and the larger defense contractor ecosystem, helping them transform their missions and businesses while moving securely to the Cloud. Mark supports CISOs and their teams with cybersecurity reviews and helps them understand Microsoft's perspectives on the evolving cyber threat landscape and how Microsoft defends its enterprise, employees and users around the world. Mark is based in Redmond, WA.

Before joining CSG, Mark ran Microsoft's Government Security Program, Microsoft's global trust and transparency initiative for national governments. Mark also previously ran Microsoft's Security Cooperation Program, and the Child Exploitation Tracking System (CETS) initiative, through which Microsoft partnered with international law enforcement agencies to combat the online sexual exploitation of children.

Mark joined Microsoft in June, 2007, after 11 years in the US government working on information assurance, counterterrorism and regional security issues. Mark has an MA from the University of Washington, a BA from the University of Wisconsin, and a certificate in Korean language from Yonsei University, Seoul, Korea. He also holds CISSP and CCSP designations from ICS2.

Sudhir Mehta

Global Vice President for Product Management and Strategy, Unisys

Sudhir Mehta is the Global Vice President for Product Management and Strategy wherein he leads and executes our strategies across products and applications, partnering with Technology product owners, Enterprise Solutions and Unisys Federal to achieve our defined business outcomes.

Sudhir is an accomplished leader with deep global experience in product management, managed security services, infrastructure transformation, SaaS and public cloud (including Microsoft Azure, AWS and Google Cloud Platform). Most recently he was responsible for Symantec's Cloud Strategy with SaaS Products and Partner Integrations, leading the acceleration of Symantec's Security SaaS solutions. At Symantec he also directed product management for Global Systems Integrators and Norton products.

Prior to Symantec, Sudhir held several leadership roles with HP and Nokia in which he managed product P&L, drove large services businesses, established partner programs and mentored and grew teams.

Max Vetter

Chief Cyber Officer, Immersive Labs

Max has over 15 years experience in the cyber industry. Having studied astrophysics at university he moved into a role in the Met police targeting industrial and commercial crime. It was here that he also started exploring open source intelligence which led to the Dark Web. He specialised in internet investigations into darknets and cryptocurrencies. He also taught at the GCHQ summer school, educating the students on reverse engineering and ethical hacking.

Curtis Simpson

Chief Information Security Officer, Armis

Curtis Simpson manages risk for the Armis platform, as well as customer security and privacy. Previously, he was VP and Global CISO at Sysco, a Fortune 54 company, where he directed a portfolio of innovative and effective, business-focused security and compliance programs responsible for reducing security risks faced by a global organization.

Dr. Zulfikar Ramzan

CTO, RSA

As Chief Technology Officer of RSA, Dr. Zulfikar Ramzan leads the development of RSA's technology strategy and is responsible for bringing to market innovations that protect customers from advanced cyberthreats. He joined RSA in 2015 from Elastica, where he was Chief Technology Officer. Ramzan holds more than 50 patents and a Ph.D. in electrical engineering and computer science from MIT.

Daniel Christiansen

Staff Cybersecurity Advisor, Splunk

Daniel Christiansen has over 20 years of cybersecurity experience, and has worked for six years with the DoD, Intelligence Community, and Federal Civilian agencies on security related projects. Dan currently works for Splunk as a Staff Cybersecurity Advisor and focuses primarily on State and Local Agency security projects. Dan''s expertise is around SIEM, User Behavior Analytics, Insider Threat, and Machine Learning.

Ricardo Font

Senior Product Marketing Manager, Gigamon

Ricardo Font is a Senior Product Marketing Manager with Gigamon. He has over 15 years of experience in the security space, working with directly with vendor Security Technologies (Firewalls, IDS/IPS, Mail/Web gateways, ATP, NDR, Identity) in both pre and post sales roles and as a Product Manager. He resides in Atlanta.

Charles Fortune

COO and Co-Founder, BeyondID

With 23 years of security experience, and 15 of those years being focused on identity and access management / access governance, Charles is able to help customers develop their requirements, create a scalable design & architecture around iDaaS and adjacent security solutions. Going beyond ID means solving more than just identity and access management problems.

Swaroop Sham

Senior Product Marketing Manager, Security, Okta

Swaroop Sham is a Senior Product Marketing Manager for Security at Okta. His main focus areas include Multi-factor Authentication, Adaptive Authentication, and Security Integrations. He recently joined Okta, bringing with him over 10 years of experience in cybersecurity. He previously worked at Sift Science, Proofpoint, FireEye and F5 Networks. Swaroop has a Master's and Bachelor's degree in Computer Science.

Bernard Harguindeguy

CTO

Scott M Giordano

V.P. & Sr. Counsel, Privacy and Compliance

Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management consulting experience. An IAPP Fellow of Information Privacy and a Certified Information Security Systems Professional (CISSP), Scott serves as Spirion's subject matter expert on multinational data protection and its intersection with technology, export compliance, internal investigations, information governance, and risk management. Prior to joining Spirion, he served as Director, Data Protection for Robert Half Legal and established the global privacy program for Esterline Technologies Corporation in Bellevue, WA. During his career, Scott has held senior positions at several legal technology firms and is listed as co-inventor on Intelligent Searching of Electronically Stored Information, patent application no. 13/842,910. In addition, he taught the first law school course anywhere on electronic evidence and e-discovery. Scott is a member of the bar in Washington state, California, and the District of Columbia.

Jasson Casey, PhD.

Chief Technology Officer, Beyond Identity

Jasson has served as CTO of SecurityScorecard, VP of Engineering at IronNet Cybersecurity, Founder and Executive Director of Flowgrammable as well as Compiled Networks, VP of VoIP Product Development at CenturyTel, among other technical and executive roles. Jasson received a bachelor's degree in computer engineering from The University of Texas at Austin and a Ph.D. in computer engineering from Texas A&M University.

Patrick McBride

Chief Marketing Officer, Beyond Identity

Patrick has served as CMO of ZeroFOX and Claroty, as VP of Marketing at iSIGHT Partners and Xceedium, VP of Compliance at Scalable Software, Co-founder and CEO of META Security Group, and Senior Vice President at META Group. Patrick received a bachelor's degree in management from Keene State College in New Hampshire.

Darrin Kimes

Senior Special Agent, US Secret Service

Darrin Kimes is a Special Agent/Technical Staff Assistant with the Secret Service's Chicago Electronic Crimes Task Force. Most of his 21 years have been dedicated to digital forensics and cyber investigations. Kimes currently serves as the Digital Forensics Lab Director for the CECTF. There he manages the day-to-day work of the lab while also assisting the CECTF in cybercrime investigations. His Secret Service career has also given him the opportunity to protect former-President Jimmy Carter in some of the more challenging locations around the world to include Darfur, Sudan; the Gaza Strip; Ramallah, West Bank; and Pyong Yang, North Korea.

Sadia Mirza

Sadia Mirza is part of the Cybersecurity, Information Governance and Privacy practice group at Troutman Sanders, and is also part of the Financial Services Litigation practice group. She provides strategic privacy compliance counseling, and defends, counsels and represents companies on matters relating to data privacy, data use, and incident response and investigation, with an eye towards helping clients avoid litigation. Additionally, she has experience with the California Consumer Privacy Act of 2018 (CCPA), the Fair Credit Reporting Act (FCRA), the Gramm-Leach-Bliley Act (GLBA), as well as various other laws concerning privacy and cybersecurity. Mirza's in-house background allows her to understand the issues and concerns clients have and guide them toward resolution in a clear and efficient way. She has worked with clients from a variety of industries, including financial institutions, consumer reporting agencies, insurance companies, healthcare providers, and data and analytics providers. Prior to becoming an attorney, Mirza worked for JPMorgan Chase and Washington Mutual Bank. Her ongoing interest in the financial services industry led her to pursue an LL.M. in banking and finance after graduating from law school.

Lisa Lorenzin

Director, Transformation Strategy, Zscaler

Lisa Lorenzin is Director of Transformation Strategy at Zscaler, specializing in secure access to private applications. She has worked in a variety of Internet-related roles since 1994, with over twenty years of focus on network and information security, and has contributed to open standards for endpoint integrity and network security from the Trusted Computing Group (TCG) and Internet Engineering Task Force (IETF). Lorenzin is currently concentrating on software-defined perimeter / zero-trust architecture and seamless user experience across cloud and mobile environments.

Jorn Velaers

Vice President IT Infrastructure and Support Services, American Tower

Jorn Velaers brings nearly two decades of IT experience to American Tower, serving as Vice President IT Infrastructure and Support services. Velaers leads worldwide IT infrastructure and support services including physical and cloud data centers, network, storage, database administration, application administration, first-level service desk support, second- and third-tier application support. Velaers acts as the primary IT interface and liaison to corporate and regional IT leadership teams and is responsible for infrastructure strategy and vision, executing a multi-year services road map and budget. Prior to American Tower, Velaers held various roles of increasing responsibility at ARAMARK and was honored with the ARAMARK CIO Award For Excellence. He is fluent in four languages and holds a number of technology licenses and certifications.

Jamie French

Director of Strategy & Portfolio, Unisys

Jamie French, Director of Strategy and Portfolio for Unisys Security Solutions is a seasoned information security leader and practitioner with over 25 years' experience. Throughout his career, Jamie has worked with every major market vertical globally holding a variety of roles focused in the realm of security ranging from SOC Analyst, Solution Architect, Technical Pre-Sales, Standards and Enablement, Research and Development, Product and Solution Management, Risk/Technical/Strategic Consulting , IT Security Auditor, Advisory Board Member, Strategist, Practitioner, Educator, Mentor, and Leader.

Clifford Shier

Managing Principal, Unisys

Over 25 years of Clifford Shier's career have been in IT Leadership roles (CIO/CISO/CTO). Mr. Shier has extensive experience in collaborative partnering to deliver sustainable results for market leading Fortune and Critical Infrastructure companies in both the Private and Public Sector. He has led numerous business transformation and high growth initiatives resulting in significant measurable gains in performance, profitability and competitiveness. As Trusted Executive Advisor and IT/Business Strategist to Unisys clients globally, Mr. Shier brings expertise to deliver on the promise of sustainable and secure Digital Transformation.

Andrew Lorandos

CISSP, Progress

Andrew Lorandos is a CISSP certified IT professional with over 10 years experience responding to both internal and external customer queries. He has acted as a subject matter expert for executive leadership, external users, and vendors, creating an environment of trust and professionalism.

Greg Mooney

Sr Community Development Manager, IT & Security, Progress

Greg is a technologist and data geek with over 10 years in tech. He has worked in a variety of industries as an IT manager and software tester. Greg is an avid writer on everything IT related, from cyber security to troubleshooting.

Enter your email address to reset your password

Already have anISMG account?

Forgot Your Password Message:

Contact Us

Already have anISMG account?

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.